Getting Comfortable With The Basics

Security

1 2 3 9

Here’s how to wrangle your passwords

Here’s how to wrangle your passwords without going crazy – By Sean Captain fastcompany.com

Marriott. Exactis. Under Armour. The list of online breaches marches on. You can’t prevent corporations from bungling security and leaking your data. But taking extra care with your logins can minimize the damage. Some best practices are obvious: For instance, you shouldn’t use the same username and password for multiple sites, lest hackers who break into one account can access others. And if you don’t store information–such as credit card numbers–in the first place, it can’t be breached.


Better password protections in Chrome – How it works – By security.googleblog.com


Don't Wait for Microsoft to Reset Your Account's Password – By lifehacker.com

Microsoft’s decision to reset the passwords of 44 million accounts, is actually a good thing. If your account is affected, thank Father Gates, because Microsoft is alerting you to the fact that it searched a database of more than three billion leaked accounts and found information belonging to yours.

Wyze’s New Subscription Plan

Wyze’s New Subscription Plan Keeps Your Video Going for $1.49 a Month – By Josh Hendrickson reviewgeek.com

Wyze, the company behind the best and cheapest Wi-Fi cameras on the market, is taking the wraps off its first subscription service today. For $1.49 a month, Wyze Cams gain continuous recording, as opposed to limited 12-second clips. You can also try the service for free for two weeks before committing—no credit card required.

The best password managers for 2019 and how to use them

The best password managers for 2019 and how to use them – By Clifford Colby cnet.com

No more struggling to come up with clever, cryptic passwords that you have a hard time remembering. With a secure and easy-to-use password manager, you can manage your login credentials across all your devices, keeping your passwords secure, automatically filling in forms, and syncing your data across MacOS, Windows, Android phones, iPads, iPhones and more.


Roboform Everywhere review: Solid password security – By Michael Ansaldo pcworld.comOne of the earliest password managers, Roboform Everywhere doesn’t quite have the cachet that its longevity would suggest. Despite its age, it lacks much of the polish and sophistication of products like LastPass and Keeper. But its relative simplicity makes it good option for newbies or user who want get a better handle on their passwords without too much complexity.


Why you should never reuse a password – By Mir Ubaid tomsguide.com4

Are you one of those people? You know, the ones who use the same password for almost every website? You've heard that's a bad idea, but you think you're secure, right?

Ditch Google Authenticator for Authy (for Two-Factor Authentication)

Why You Should Ditch Google Authenticator for Authy (for Two-Factor Authentication) – By Khamosh Pathak guidingtech.com

Google is pushing two-factor authentication really hard. And that’s great news. The problem is that Google Authenticator for Android is an abomination (and I’m not even using hyperbole here). It’s still using Holo interface. That’s now 2 generations old. What hurts even more is the fact that Google Authenticator for iPhone was upgraded recently with Material Design.


Authy vs LastPass Authenticator: Which 2FA App Should You Use – By Gaurav Bidasaria guidingtech.com

As privacy concerns continue to rise, the use of two-factor authentication (2FA) apps is now a necessity. Apart from Google and Microsoft, a handful of players are offering their 2FA apps packed with new and innovative features. Authy and LastPass Authenticator are quickly rising the popularity charts among the 2FA apps.

You’re Probably Doing 2FA Wrong

You're Probably Doing 2FA Wrong: Here's the Right Way – By Paul Wagenseil Tom's Guide

The most common method for two-factor authentication is texted codes, but it's also the least secure.
Google, Facebook, Apple, Microsoft, Dropbox and many other online services offer two-factor authentication (2FA) as an option to protect your account.
With 2FA enabled, it's much harder for a crook to break into your account, even if he or she knows or can guess your password, because the crook will be missing that crucial second factor that only you possess. We at Tom's Guide urge our readers to enable 2FA whenever they can.

Are free password managers safe to use?

Are free password managers safe to use?  – By Ken Colburn datadoctors.com

Everyone has heard the advice that you need to use long, complex passwords that are unique to each account that you use. Unless you only have one or two online accounts, the only way to adhere to these security measures is to use some form of password manager.


Low-Hanging Fruit Series: Multi-factor Authentication (MFA)  – By Austin Downing vdalabs.com

At VDA Labs we work with a variety of companies both large and small. During our engagements, we see many of the same reoccurring issues that allow us access to systems. To help combat these threats VDA Labs is starting a blog series we are calling “Low-Hanging Fruit”. Throughout this series VDA will be talking about the most common issues we see, along with how each issue can be combated. In our previous piece we talked about password security.  This article discusses why organizations need Multi-Factor Authentication (MFA) and some foibles we see around MFA implementations.

– Virtual Payment Cards

Privacy.com Offers Virtual Payment Cards To Keep Your Digital Cash Secure – By Curtis Silver forbes.com

Technology, as cliche as this might sound, has come a long way. Yet, we still cling to paper and plastic as payment methods. Plastic being the dominant one these days. Chip readers, card swipers and constantly typing our debit card number into online forms puts us and our meager finances at continuous risk. Similar to how we protect ourselves online through VPN services, Privacy.com offers virtual payment cards that act like a VPN when it scrambles your IP address, shielding your true account information from possible scammers.


Money at 30: Privacy.com Review — How it Could Help Keep Your Money Safe  – By Kyle Burbank dyernews.com

First the bad news: considering all the major data breaches that have hit retailers, websites, and freaking credit bureaus alike, there’s a very strong chance your personal info has been compromised at some point. Luckily, in addition to steps you can take such as freezing your credit reports to prevent criminals from using this data, there are a growing number of tools you can use to foil thieves in the future. Add to this list Privacy.com, which allows users to create unique card numbers they can use to conceal their actual info.

 

How Safe Are Password Managers?

How Safe Are Password Managers? – By Chris Hoffmanhowtogeek.com

A password manager stores all your passwords and automatically fills them in your web browser and mobile apps. But is trusting an app with your passwords and storing them all in one place a smart idea?


What's the Password? – By Constance Gibbs timeforkids.com

In an ancient folktale, a giant rock blocks the entrance to a cave filled with treasure. A door appears only for those who speak a secret phrase aloud: “Open, sesame!” This is an early example of a password.

Enable 2FA for your favorite sites

Enable 2FA for your favorite sites.
Go beyond the password and protect yourself from hackers and account takeovers. 2-factor authentication (2FA) is the best way to protect yourself online. Defeat cyber criminals & avoid account takeovers with stronger security, for free! Watch the video below to learn more about why you should enable 2FA for your accounts.


The Best Two-Factor Authentication App – thewirecutter.com
The most important thing you can do to increase your online security, alongside using a password manager, is to enable two-factor authentication. After interviewing three experts and testing seven authenticator apps, we think Authy has the best combination of compatibility, usability, security, and reliability.


Getting started with security keys  – By Bruce Schneier paulstamatiou.com

Every week I come across another headline about how someone got hacked and within moments many of their online accounts had become compromised. These aren't simple cases of bad actors using account credentials from large public data breaches and the unfortunate result of people using the same password across many websites.

Put a stop to robocalls for good 

Put a stop to robocalls for good  – By Jason Cipriani cnet.com

I think it's safe to say we've all received a call that starts with "Hello, can you hear me?" Or how about "Congratulations! You've won a free trip to the Bahamas!" the moment you say hello. It's somewhat exciting, if not confusing the first time it happens. But when you realize it's a robocall and, ultimately, a scam, that's when frustration sets in. 


Stop Unwanted Robocalls and Texts  – By fcc.gov

Robocalls are calls made with an autodialer or that contain a message made with a prerecorded or artificial voice.

Advances in technology have unfortunately allowed illegal and spoofed robocalls to be made from anywhere in the world and more cheaply and easily than ever before. That's why it's become more of a problem for consumers, and a more difficult problem to solve.

Old Wi-Fi Routers Aren’t Just Slow, They’re Insecure: It’s Time to Upgrade

Old Wi-Fi Routers Aren’t Just Slow, They’re Insecure: It’s Time to Upgrade – By Jason Fitzpatrick lifesavvy.com

For most people, their wireless router is just some dusty box they never think about unless it’s not working. But old routers aren’t just slower; they’re often insecure. Here’s how to fix that.


I Completely Solved the Wi-Fi Issues in My House By Adding These New Products From Google  – By John Brandon thedailybeast.com

“What the heck is wrong with the wireless?” This is a question that comes up often in my house. My usual response: No idea. The gremlins and fairies that carry my Internet data back and forth between the iPad in my hands, my phone, a connected garage door opener, a connected doorbell, the security cameras, and 17 million other gadgets in my house are taking a break I guess. They’re tired. I’m not actually sure how any of this works, and if you start talking to me about wireless network specifications I will hit myself in the head with a frying pan.

LastPass Security Features You Should Be Using

LastPass Security Features You Should Be Using – By Amber Steel blog.lastpass.com

Ready to take your security to the next level? In our first post for Cyber Security Awareness Month, we discussed how to set up LastPass to protect your digital profile. Now that you’re more familiar with some of the basic components of LastPass and how it can help protect you, let’s dive into the features and settings that will boost the security of your LastPass vault and help you better secure your digital profile.  

How to use Google Chrome’s password manager

How to use Google Chrome’s password manager  – By Michael Allison mspoweruser.com

Saving your passwords in your head may be an old fashioned way of doing things, but it is quite impractical. You may forget, misremember, or even end up duplicating passwords (inadvisable). Saving it in a notebook, either physical or digital is just asking to be hacked. Common wisdom suggests users make use of a password manager, and Google’s Chrome has that built-in.

Two-Factor Authentication and Private Browsing

No One Knows About Two-Factor Authentication and Private Browsing – By lifehacker.com

Sounds strange, doesn’t it? As much as we try to promote the importance of this security measure—a secondary means of identifying that whoever is trying to log into your account is actually you—a recent survey from the Pew Research Center indicates that more than half of those quizzed cannot identify a single example of two-factor authentication.

Explained: Two-Factor vs. Multi-Factor Authentication

Explained: Two-Factor vs. Multi-Factor Authentication – By Yaser Masoudnia securityledger.com

Everyone knows that passwords alone aren’t enough. Weak, reused or old passwords cause 80 percent of data breaches. From phishing to ransomware, zero-day vulnerabilities, to man-in-the-middle attacks, to key-logging and password cracking, cyberattacks leverage faster tools and exploit known weaknesses to get around even the strongest of passwords. Every application, device and login is an entryway to your business. They need to be better protected.

Is It Safe To Unsubscribe From Spam Emails?

Is It Safe To Unsubscribe From Spam Emails? Be Careful What You Click  – By Sarah Friedmann bustle.com

The "unsubscribe" button seems like a pretty surefire way to stop unwanted emails from clogging up your inbox. However, clicking this seemingly innocuous button could come with a risk. Surprisingly, it actually isn't safe to unsubscribe from spam emails this way — in fact, some scammers rely on your click to access even more of your information.

Former hacker warns against password reuse

Former hacker warns against password reuse By Danny Bradbury   nakedsecurity.sophos.com

Kyle Milliken is back from jail, and he has some advice for you.

The 30-year-old hacker from Arkansas, according to his blog, at age 17 began phishing celebrity Myspace accounts and using them to send internet marketing spam. After earning $5,000 per week, he evolved to hack millions of email, forum, and social media accounts. Some of his largest thefts included Disqus (17.5 million), Kickstarter (5.2 million) and Imgur (1.7 million). He also claims to have hit Twitter and Pinterest among many others.

How To Use A Password Manager

How To Use A Password Manager  – By Tyler Leeubergizmo.com

Using the same password for all your online accounts is probably the worst idea ever. This is because in the event your password is leaked, hackers will be able to access all your online accounts and services.


Best password managers: Reviews of the top products  – By Michael Ansaldopcworld.com

We are terrible at passwords. We suck at creating them (the top two most popular remain “123456” and “password”), we share them way too freely, and we forget them all the time. Indeed, the very thing that can ensure our online security has become our biggest obstacle to it. This is what makes a good password manager essential.

Fraud Alert: Genetic Testing Scam

Fraud Alert: Genetic Testing Scam by U.S. Department of Health and Human Services Office of Inspector General 

The U.S. Department of Health and Human Services Office of Inspector General is alerting the public about a fraud scheme involving genetic testing. Genetic testing fraud occurs when Medicare is billed for a test or screening that was not medically necessary and/or was not ordered by a Medicare beneficiary's treating physician.

What is Google Smart Lock, Exactly?

What is Google Smart Lock, Exactly? – By Cameron Summersonhowtogeek.com

Google does this thing where it uses bad names for products. Then it re-uses those names for other products, confusing everyone. Such is the case for Smart Lock, which is technically three different things, depending on whether you’re talking about Android, Chromebooks, or passwords.


Use Smart Lock to Automatically Unlock Your Chromebook With Your Android Phone – By Emailhowtogeek.com

The “Smart Lock” feature on Chrome OS allows you to pair your Chromebook with your Android phone, automatically unlocking it when the phone is nearby and unlocked.

Spam In your Calendar? Here’s What to Do

Spam In your Calendar? Here’s What to Do. – By krebsonsecurity.com

Many spam trends are cyclical: Spammers tend to switch tactics when one method of hijacking your time and attention stops working. But periodically they circle back to old tricks, and few spam trends are as perennial as calendar spam, in which invitations to click on dodgy links show up unbidden in your digital calendar application from Apple, Google and Microsoft. Here’s a brief primer on what you can do about it.


Google Has a Fix to Stop Google Calendar Spam – By Kris Woukmakeuseof.com

Google is working on a fix to stop Google Calendar spam. Which is hitting more and more people every week. And while Google’s permanent fix isn’t ready yet, there is a way to stop Google Calendar spam right now by tweaking a few settings.


Google says it’s working to remove annoying spam from Calendar – By Manuel Vonauandroidpolice.com

In June, we discovered that spammers and scammers found a new way to distribute their unwarranted information via Google Calendar by exploiting a default setting in Gmail which automatically invites email recipients to events. Now, Google is finally ready to step in. The company today announced that it's working on resolving the issue, but isn't ready to share any details just yet.

Experts share hassle-free security tips

Experts share their (mostly) hassle-free security tips – By Roberto Baldwinengadget.com

It seems like every day another big corporation discloses a breach. Equifax, Capital One, Marriot, and a whole host of other companies have leaked the personal data of millions of their customers. That pilfered information could be used to steal identities or hack into other accounts. This sobering reality is a reminder that more than ever, we should secure our accounts and take control of our data. You probably can't stop hackers from breaking into a hotel chain, but you can put up roadblocks to stop them from infiltrating your life.

Microsoft Says Password Strength Doesn’t Matter: Here’s Why It Does

Microsoft Says Password Strength Doesn't Matter: Here's Why It Does – By Paul Wagenseiltomsguide.com

Some password managers are not as effective as others.
Your password strength doesn't matter, says a Microsoft security expert. Not the length, not the complexity, not how many special characters it uses. Hackers can get it anyway, and the only thing that truly makes a difference, he says, is whether you have two-factor authentication (2FA) turned on.

Everybody Should 2FA 

Everybody Should 2FA  – By Authy youtube.com  Video

Learn more about two-factor authentication and download the Authy app for IOS, Android and Chrome.


How to do two-factor authentication like a pro – By Sandra Gutierrez G 
You can hold the key to your online security. Like, literally.
If your level of anxiety over online security and privacy is on the healthy side, you probably already have two-factor authentication (2FA) set up for your main accounts. If you don't, you should seriously consider activating it to protect yourself from phishing, hacks, and anybody who may want to steal your data.

1 2 3 9
Tech News by Topic